“Exploiting Non-intrusive Monitoring in Real-Time Embedded Operating Systems”
From Navigators
(Difference between revisions)
Line 17: | Line 17: | ||
bedded operating systems, via non-intrusive mechanisms. | bedded operating systems, via non-intrusive mechanisms. | ||
|address=Lisbon, Portugal | |address=Lisbon, Portugal | ||
- | |booktitle=Proceedings of the 4th Embedded Operating Systems Workshop (EWiLi 2014) | + | |booktitle=Proceedings of the 4th Embedded Operating Systems Workshop (EWiLi 2014) - Poster Session |
|pages=2 pages | |pages=2 pages | ||
}} | }} | ||
- |
Revision as of 13:04, 29 May 2015
Ricardo Correia Pinto, José Rufino
in Proceedings of the 4th Embedded Operating Systems Workshop (EWiLi 2014) - Poster Session, Lisbon, Portugal, Nov. 2014, pp. 2 pages.
Abstract: Monitoring in embedded system software can have several uses, ranging from system characterization to run-time verification (RV). Traditional monitoring techniques require code instrumentation, imposing an overhead on system execution both in performance and timeliness. In real-time systems this is exarcebated by the need of new worst-case execution time estimation and schedulability analysis. In this paper we discuss how monitoring can be exploited in real-time em- bedded operating systems, via non-intrusive mechanisms.
Download paper
Download Exploiting Non-intrusive Monitoring in Real-Time Embedded Operating Systems
Export citation
Project(s): Project:READAPT
Research line(s): Timeliness and Adaptation in Dependable Systems (TADS)